Pass the GIAC Management GSLC Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which of the following DNS servers provides fault tolerance, load distribution, and easier remote name resolution for the primary DNS server?

Options:

A.

Forwarding server


B.

Root server


C.

Caching-only server


D.

Slave server


Expert Solution
Questions # 47:

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Options:

A.

Reconnaissance


B.

Maintaining access


C.

Covering tracks


D.

Gaining access


Expert Solution
Questions # 48:

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The company's network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. The functional level of the forest is Windows Server 2008. You are designing a public key infrastructure (PKI) for the network. The network will use a root enterprise certificate authority (CA) and a subordinate CA. The root CA will be used to issue certificates to the subordinate CA, and the subordinate CA will be used to issue certificates to the clients.

The management of the company wants to ensure that the security of high-level CAs is not compromised. Which of the following steps will you take to accomplish the task?

Options:

A.

Take the root CA offline after it issues certificates to its subordinate CAs.


B.

Take the subordinate CA offline after it gets the certificates from the root CA.


C.

Place all CA servers in a locked room.


D.

Configure a firewall on the network.


Expert Solution
Questions # 49:

Which of the following methods can be helpful to eliminate social engineering threat?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Password policies


B.

Data classification


C.

Vulnerability assessments


D.

Data encryption


Expert Solution
Questions # 50:

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

Options:

A.

Smurf


B.

Denial of Service


C.

Virus


D.

Evil Twin


Expert Solution
Questions # 51:

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:

A.

Vulnerability attack


B.

Denial-of-Service attack


C.

Impersonation attack


D.

Social Engineering attack


Expert Solution
Questions # 52:

Which of the following processes is described in the statement below?

"This is the process of numerically analyzing the effect of identified risks on overall project objectives."

Options:

A.

Identify Risks


B.

Perform Quantitative Risk Analysis


C.

Monitor and Control Risks


D.

Perform Qualitative Risk Analysis


Expert Solution
Questions # 53:

A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to perform war dialing?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Wingate


B.

ToneLoc


C.

THC-Scan


D.

NetStumbler


Expert Solution
Questions # 54:

You are responsible for securing the network at a law firm. You are concerned about printer security.

What steps should you take to prevent printer security breaches?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Remove the printer's driver from user computers.


B.

Scan printer hard drives for spyware and viruses.


C.

Limit print jobs.


D.

Secure any administrative connections (SSH, Telnet, etc.) to printers.


Expert Solution
Questions # 55:

You are the project manager of the HQQ Project for your company. You are working with your project stakeholders to discuss the risks in the project that can adversely affect the project objectives. You are discussing the possibilities of causes for an identified risk event in your project. Your stakeholder is confused on the difference between causes and risk events. Which of the following is NOT an example of a cause for a project risk?

Options:

A.

Schedule constraints on the project


B.

Limited team members to complete the project work


C.

Quality assurance programs within the company


D.

Work permit requirements


Expert Solution
Questions # 56:

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network environment. The network contains a Cisco Catalyst router to connect the internal network to the Internet. You want to secure your network from various attacks such as virus, spam, spyware, phishing, etc. You want to secure the whole network through a separate hardware device. Which of the following will you use?

Options:

A.

PIX-Firewall


B.

IDS


C.

IPS


D.

ASA


Expert Solution
Questions # 57:

Which of the following statements correctly defines a script kiddie?

Options:

A.

He is an individual who uses hacking programs developed by others to attack information systems and spoil websites.


B.

He is an individual who is an expert in various computer fields such as operating systems, networking, hardware, software, etc. and enjoys the mental challenge of decoding computer programs, solving network vulnerabilities and security threats, etc.


C.

He is an individual who breaks communication systems to perform hacking.


D.

He is an individual who has lost respect and integrity as an employee in any organization.


Expert Solution
Questions # 58:

Which of the following applications work as mass-emailing worms?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Nimda virus


B.

I LOVE YOU virus


C.

Melissa virus


D.

Chernobyl virus


Expert Solution
Questions # 59:

Which of the following tools can be used for the anti-phishing?

Options:

A.

Legion


B.

Spector


C.

Netcraft


D.

eblaster


Expert Solution
Questions # 60:

Which of the following terms describes the statement given below?

"It is a cryptographic protocol that provides security and data integrity for communications over networks such as the Internet."

Options:

A.

NTP


B.

SSH


C.

SNMP2/3


D.

TSL


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions